Experts warn that DNA sequencers are vulnerable to bootkit attacks


  • Eclypsium researchers find vulnerability in the way iSeq 100 starts up
  • The bug allows threat actors to establish persistence, block the device, or tamper with the results
  • A patch is now available, so update now

A popular DNA sequencer has been found with a vulnerability that could allow threat actors to establish persistence on the device, destroy its hardware or even tamper with the results, experts claim.

Eclypsium researchers analyzed the BIOS firmware in iSeq 100, a DNA sequencer built by US biotechnology company Illumina, a benchtop sequencing system designed for small-scale genomic and targeted sequencing applications. It is used to read and analyze DNA, help researchers understand genetic information, study diseases, develop treatments, or investigate how organisms are related.